gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r32269 - in gnunet/src: consensus secretsharing


From: gnunet
Subject: [GNUnet-SVN] r32269 - in gnunet/src: consensus secretsharing
Date: Mon, 10 Feb 2014 01:30:23 +0100

Author: dold
Date: 2014-02-10 01:30:23 +0100 (Mon, 10 Feb 2014)
New Revision: 32269

Modified:
   gnunet/src/consensus/consensus_protocol.h
   gnunet/src/consensus/gnunet-consensus-profiler.c
   gnunet/src/consensus/gnunet-service-consensus.c
   gnunet/src/consensus/test_consensus.conf
   gnunet/src/secretsharing/gnunet-secretsharing-profiler.c
Log:
- correct handling of timeouts in consensus
- fixed segfault in secretsharing profiler


Modified: gnunet/src/consensus/consensus_protocol.h
===================================================================
--- gnunet/src/consensus/consensus_protocol.h   2014-02-10 00:13:13 UTC (rev 
32268)
+++ gnunet/src/consensus/consensus_protocol.h   2014-02-10 00:30:23 UTC (rev 
32269)
@@ -45,7 +45,7 @@
    */
   struct GNUNET_MessageHeader header;
   uint32_t round;
-  uint32_t exp_round;
+  uint32_t exp_repetition;
   uint32_t exp_subround;
 };
 

Modified: gnunet/src/consensus/gnunet-consensus-profiler.c
===================================================================
--- gnunet/src/consensus/gnunet-consensus-profiler.c    2014-02-10 00:13:13 UTC 
(rev 32268)
+++ gnunet/src/consensus/gnunet-consensus-profiler.c    2014-02-10 00:30:23 UTC 
(rev 32269)
@@ -37,6 +37,8 @@
 
 static struct GNUNET_TIME_Relative conclude_timeout;
 
+static struct GNUNET_TIME_Relative consensus_delay;
+
 static struct GNUNET_CONSENSUS_Handle **consensus_handles;
 
 static struct GNUNET_TESTBED_Operation **testbed_operations;
@@ -408,7 +410,7 @@
     return;
   }
 
-  start = GNUNET_TIME_absolute_get ();
+  start = GNUNET_TIME_absolute_add (GNUNET_TIME_absolute_get (), 
consensus_delay);
   deadline = GNUNET_TIME_absolute_add (start, conclude_timeout);
 
   GNUNET_log (GNUNET_ERROR_TYPE_INFO,
@@ -443,6 +445,9 @@
       { 't', "timeout", NULL,
         gettext_noop ("consensus timeout"),
         GNUNET_YES, &GNUNET_GETOPT_set_relative_time, &conclude_timeout },
+      { 'd', "delay", NULL,
+        gettext_noop ("delay until consensus starts"),
+        GNUNET_YES, &GNUNET_GETOPT_set_relative_time, &consensus_delay },
       { 'V', "verbose", NULL,
         gettext_noop ("be more verbose (print received values)"),
         GNUNET_NO, &GNUNET_GETOPT_set_one, &verbose },

Modified: gnunet/src/consensus/gnunet-service-consensus.c
===================================================================
--- gnunet/src/consensus/gnunet-service-consensus.c     2014-02-10 00:13:13 UTC 
(rev 32268)
+++ gnunet/src/consensus/gnunet-service-consensus.c     2014-02-10 00:30:23 UTC 
(rev 32269)
@@ -36,6 +36,10 @@
 
 /**
  * Log macro that prefixes the local peer and the peer we are in contact with.
+ *
+ * @param kind log level
+ * @param cpi ConsensusPeerInformation of the partner peer
+ * @param m log message
  */
 #define LOG_PP(kind, cpi, m,...) GNUNET_log (kind, "P%d for P%d: " m, \
    cpi->session->local_peer_idx, (int) (cpi - 
cpi->session->info),##__VA_ARGS__)
@@ -44,8 +48,9 @@
 /**
  * Number of exponential rounds, used in the exp and completion round.
  */
-#define NUM_EXP_ROUNDS 4
+#define NUM_EXP_REPETITIONS 4
 
+
 /* forward declarations */
 
 /* mutual recursion with struct ConsensusSession */
@@ -70,14 +75,8 @@
    */
   CONSENSUS_ROUND_EXCHANGE,
   /**
-   * Exchange which elements each peer has, but don't
-   * transmit the element's data, only their SHA-512 hashes.
-   * This round uses the all-to-all scheme.
+   * Collect and distribute missing values.
    */
-  CONSENSUS_ROUND_INVENTORY,
-  /**
-   * Collect and distribute missing values with the exponential scheme.
-   */
   CONSENSUS_ROUND_COMPLETION,
   /**
    * Consensus concluded. After timeout and finished communication with client,
@@ -88,8 +87,7 @@
 
 
 /**
- * Complete information about the current round and all
- * subrounds.
+ * Information about the current round.
  */
 struct RoundInfo
 {
@@ -98,10 +96,10 @@
    */
   enum ConsensusRound round;
   /**
-   * The current exp round, valid if
+   * The current exp round repetition, valid if
    * the main round is an exp round.
    */
-  uint32_t exp_round;
+  uint32_t exp_repetition;
   /**
    * The current exp subround, valid if
    * the main round is an exp round.
@@ -154,7 +152,7 @@
   struct GNUNET_TIME_Absolute conclude_deadline;
 
   /**
-   * Timeout task identifier for the current round.
+   * Timeout task identifier for the current round or subround.
    */
   GNUNET_SCHEDULER_TaskIdentifier round_timeout_tid;
 
@@ -192,7 +190,7 @@
   /**
    * Current round of the exponential scheme.
    */
-  uint32_t exp_round;
+  uint32_t exp_repetition;
 
   /**
    * Current sub-round of the exponential scheme.
@@ -200,12 +198,16 @@
   uint32_t exp_subround;
 
   /**
-   * The partner for the current exp-round
+   * The partner for the current exp-round.
+   * The local peer will initiate the set reconciliation with the
+   * outgoing peer.
    */
   struct ConsensusPeerInformation *partner_outgoing;
 
   /**
    * The partner for the current exp-round
+   * The incoming peer will initiate the set reconciliation with
+   * the incoming peer.
    */
   struct ConsensusPeerInformation *partner_incoming;
 
@@ -239,9 +241,9 @@
   struct ConsensusSession *session;
 
   /**
-   * We have finishes the exp-subround with the peer.
+   * Have we finished the set operation for this (sub-)round?
    */
-  int exp_subround_finished;
+  int set_op_finished;
 
   /**
    * Set operation we are currently executing with this peer.
@@ -286,16 +288,27 @@
 static struct GNUNET_PeerIdentity my_peer;
 
 
+/**
+ * Check if the current subround has finished.
+ * Must only be called when an exp-round is the current round.
+ *
+ * @param session session to check for exp-round completion
+ * @return GNUNET_YES if the subround has finished,
+ *         GNUNET_NO if not
+ */
 static int
 have_exp_subround_finished (const struct ConsensusSession *session)
 {
   int not_finished;
+
+  GNUNET_assert (CONSENSUS_ROUND_EXCHANGE == session->current_round);
+
   not_finished = 0;
   if ( (NULL != session->partner_outgoing) &&
-       (GNUNET_NO == session->partner_outgoing->exp_subround_finished) )
+       (GNUNET_NO == session->partner_outgoing->set_op_finished) )
     not_finished++;
   if ( (NULL != session->partner_incoming) &&
-       (GNUNET_NO == session->partner_incoming->exp_subround_finished) )
+       (GNUNET_NO == session->partner_incoming->set_op_finished) )
     not_finished++;
   if (0 == not_finished)
     return GNUNET_YES;
@@ -413,6 +426,8 @@
 round_over (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
 {
   struct ConsensusSession *session;
+  unsigned int i;
+  int res;
 
   /* don't kick off next round if we're shutting down */
   if ((NULL != tc) && (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
@@ -421,24 +436,48 @@
   session = cls;
   GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "P%d: round over\n", 
session->local_peer_idx);
 
+  if (tc != NULL)
+    session->round_timeout_tid = GNUNET_SCHEDULER_NO_TASK;
+
   if (session->round_timeout_tid != GNUNET_SCHEDULER_NO_TASK)
   {
     GNUNET_SCHEDULER_cancel (session->round_timeout_tid);
     session->round_timeout_tid = GNUNET_SCHEDULER_NO_TASK;
   }
 
+  for (i = 0; i < session->num_peers; i++)
+  {
+    if (NULL != session->info[i].set_op)
+    {
+      GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "P%d: canceling stray op with 
P%d\n",
+                  session->local_peer_idx, i);
+      GNUNET_SET_operation_cancel (session->info[i].set_op);
+      session->info[i].set_op = NULL;
+    }
+    /* we're in the new round, nothing finished yet */
+    session->info[i].set_op_finished = GNUNET_NO;
+  }
+
   switch (session->current_round)
   {
     case CONSENSUS_ROUND_BEGIN:
       session->current_round = CONSENSUS_ROUND_EXCHANGE;
-      session->exp_round = 0;
+      session->exp_repetition = 0;
       subround_over (session, NULL);
       break;
     case CONSENSUS_ROUND_EXCHANGE:
       GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "P%d: finished, sending elements to 
client\n",
                   session->local_peer_idx);
       session->current_round = CONSENSUS_ROUND_FINISH;
-      GNUNET_SET_iterate (session->element_set, send_to_client_iter, session);
+      res = GNUNET_SET_iterate (session->element_set, send_to_client_iter, 
session);
+      if (GNUNET_SYSERR == res)
+      {
+        GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "can't iterate set: set 
invalid\n");
+      }
+      else if (GNUNET_NO == res)
+      {
+        GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "can't iterate set: iterator 
already active\n");
+      }
       break;
     default:
       GNUNET_assert (0);
@@ -465,7 +504,7 @@
     session->shuffle_inv = GNUNET_malloc (session->num_peers * sizeof 
(*session->shuffle_inv));
 
   GNUNET_CRYPTO_kdf (randomness, sizeof (randomness),
-                    &session->exp_round, sizeof (uint32_t),
+                    &session->exp_repetition, sizeof (uint32_t),
                      &session->global_id, sizeof (struct GNUNET_HashCode),
                     NULL);
 
@@ -521,7 +560,7 @@
     /* we are outgoing */
     partner_idx = (my_idx + arc) % session->num_peers;
     session->partner_outgoing = 
&session->info[session->shuffle_inv[partner_idx]];
-    session->partner_outgoing->exp_subround_finished = GNUNET_NO;
+    GNUNET_assert (GNUNET_NO == session->partner_outgoing->set_op_finished);
     /* are we a 'ghost' of a peer that would exist if
      * the number of peers was a power of two, and thus have to partner
      * with an additional peer?
@@ -539,7 +578,7 @@
       {
         GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "ghost partner is %d\n", 
ghost_partner_idx);
         session->partner_incoming = 
&session->info[session->shuffle_inv[ghost_partner_idx]];
-        session->partner_incoming->exp_subround_finished = GNUNET_NO;
+        GNUNET_assert (GNUNET_NO == 
session->partner_incoming->set_op_finished);
         return;
       }
     }
@@ -552,7 +591,7 @@
     partner_idx += session->num_peers;
   session->partner_outgoing = NULL;
   session->partner_incoming = 
&session->info[session->shuffle_inv[partner_idx]];
-  session->partner_incoming->exp_subround_finished = GNUNET_NO;
+  GNUNET_assert (GNUNET_NO == session->partner_incoming->set_op_finished);
 }
 
 
@@ -591,7 +630,7 @@
     case GNUNET_SET_STATUS_DONE:
       GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "P%u: set result from P%u: done\n",
                   local_idx, remote_idx);
-      cpi->exp_subround_finished = GNUNET_YES;
+      cpi->set_op_finished = GNUNET_YES;
       cpi->set_op = NULL;
       if (have_exp_subround_finished (cpi->session) == GNUNET_YES)
       {
@@ -612,6 +651,7 @@
 
   switch (cpi->session->current_round)
   {
+    case CONSENSUS_ROUND_COMPLETION:
     case CONSENSUS_ROUND_EXCHANGE:
       GNUNET_SET_add_element (cpi->session->element_set, element, NULL, NULL);
       break;
@@ -640,9 +680,9 @@
     return 1;
   if (session->current_round == CONSENSUS_ROUND_EXCHANGE)
   {
-    if (session->exp_round < ri->exp_round)
+    if (session->exp_repetition < ri->exp_repetition)
       return -1;
-    if (session->exp_round > ri->exp_round)
+    if (session->exp_repetition > ri->exp_repetition)
       return 1;
     if (session->exp_subround < ri->exp_subround)
       return -1;
@@ -650,8 +690,8 @@
       return 1;
     return 0;
   }
-  /* comparing rounds when we are not in a exp round */
-  GNUNET_assert (0);
+  /* other rounds have no subrounds / repetitions to compare */
+  return 0;
 }
 
 
@@ -667,12 +707,24 @@
 subround_over (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
 {
   struct ConsensusSession *session;
+  struct GNUNET_TIME_Relative subround_timeout;
   int i;
 
   /* don't kick off next subround if we're shutting down */
   if ((NULL != tc) && (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
     return;
+
   session = cls;
+
+  GNUNET_assert (CONSENSUS_ROUND_EXCHANGE == session->current_round);
+
+  if (tc != NULL)
+  {
+    session->round_timeout_tid = GNUNET_SCHEDULER_NO_TASK;
+    GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "P%u: consensus subround timed 
out\n",
+                session->local_peer_idx);
+  }
+
   /* cancel timeout */
   if (session->round_timeout_tid != GNUNET_SCHEDULER_NO_TASK)
   {
@@ -680,16 +732,29 @@
     session->round_timeout_tid = GNUNET_SCHEDULER_NO_TASK;
   }
 
-  if (session->exp_round >= NUM_EXP_ROUNDS)
+  for (i = 0; i < session->num_peers; i++)
   {
+    if (NULL != session->info[i].set_op)
+    {
+      GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "P%d: canceling stray op with 
P%d\n",
+                  session->local_peer_idx, i);
+      GNUNET_SET_operation_cancel (session->info[i].set_op);
+      session->info[i].set_op = NULL;
+    }
+    /* we're in the new round, nothing finished yet */
+    session->info[i].set_op_finished = GNUNET_NO;
+  }
+
+  if (session->exp_repetition >= NUM_EXP_REPETITIONS)
+  {
     round_over (session, NULL);
     return;
   }
 
-  if (session->exp_round == 0)
+  if (session->exp_repetition == 0)
   {
     /* initialize everything for the log-rounds */
-    session->exp_round = 1;
+    session->exp_repetition = 1;
     session->exp_subround = 0;
     if (NULL == session->shuffle)
       session->shuffle = GNUNET_malloc ((sizeof (int)) * session->num_peers);
@@ -701,7 +766,7 @@
   else if (session->exp_subround + 1 >= (int) ceil (log2 (session->num_peers)))
   {
     /* subrounds done, start new log-round */
-    session->exp_round++;
+    session->exp_repetition++;
     session->exp_subround = 0;
     shuffle (session);
   }
@@ -710,6 +775,14 @@
     session->exp_subround++;
   }
 
+  subround_timeout =
+      GNUNET_TIME_relative_divide (GNUNET_TIME_absolute_get_difference 
(session->conclude_start, session->conclude_deadline),
+                                   2 * NUM_EXP_REPETITIONS * ((int) ceil (log2 
(session->num_peers))));
+
+  GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "subround timeout: %u ms\n", 
subround_timeout.rel_value_us / 1000);
+
+  session->round_timeout_tid = GNUNET_SCHEDULER_add_delayed (subround_timeout, 
subround_over, session);
+
   /* determine the incoming and outgoing partner */
   find_partners (session);
 
@@ -724,11 +797,12 @@
     msg->header.type = htons (GNUNET_MESSAGE_TYPE_CONSENSUS_P2P_ROUND_CONTEXT);
     msg->header.size = htons (sizeof *msg);
     msg->round = htonl (session->current_round);
-    msg->exp_round = htonl (session->exp_round);
+    msg->exp_repetition = htonl (session->exp_repetition);
     msg->exp_subround = htonl (session->exp_subround);
 
     if (NULL != session->partner_outgoing->set_op)
     {
+      GNUNET_break (0);
       GNUNET_SET_operation_cancel (session->partner_outgoing->set_op);
     }
     session->partner_outgoing->set_op =
@@ -749,6 +823,7 @@
 
     if (NULL != session->partner_incoming->set_op)
     {
+      GNUNET_break (0);
       GNUNET_SET_operation_cancel (session->partner_incoming->set_op);
       session->partner_incoming->set_op = NULL;
     }
@@ -780,7 +855,7 @@
     else
       in = (int) (session->partner_incoming - session->info);
     GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "P%u: doing exp-round, r=%d, sub=%d, 
in: %d, out: %d\n", session->local_peer_idx,
-                session->exp_round, session->exp_subround, in, out);
+                session->exp_repetition, session->exp_subround, in, out);
   }
 #endif /* GNUNET_EXTRA_LOGGING */
 
@@ -837,18 +912,16 @@
 
 
 /**
- * Although GNUNET_CRYPTO_hash_cmp exisits, it does not have
- * the correct signature to be used with e.g. qsort.
- * We use this function instead.
+ * Compare two peer identities.
  *
- * @param h1 some hash code
- * @param h2 some hash code
+ * @param h1 some peer identity
+ * @param h2 some peer identity
  * @return 1 if h1 > h2, -1 if h1 < h2 and 0 if h1 == h2.
  */
 static int
-hash_cmp (const void *h1, const void *h2)
+peer_id_cmp (const void *h1, const void *h2)
 {
-  return GNUNET_CRYPTO_hash_cmp ((struct GNUNET_HashCode *) h1, (struct 
GNUNET_HashCode *) h2);
+  return memcmp (h1, h2, sizeof (struct GNUNET_PeerIdentity));
 }
 
 
@@ -894,7 +967,7 @@
     peers[session->num_peers - 1] = my_peer;
 
   memcpy (peers, msg_peers, listed_peers * sizeof (struct 
GNUNET_PeerIdentity));
-  qsort (peers, session->num_peers, sizeof (struct GNUNET_PeerIdentity), 
&hash_cmp);
+  qsort (peers, session->num_peers, sizeof (struct GNUNET_PeerIdentity), 
&peer_id_cmp);
 
   session->info = GNUNET_malloc (session->num_peers * sizeof (struct 
ConsensusPeerInformation));
 
@@ -954,7 +1027,7 @@
   }
 
   round_info.round = ntohl (msg->round);
-  round_info.exp_round = ntohl (msg->exp_round);
+  round_info.exp_repetition = ntohl (msg->exp_repetition);
   round_info.exp_subround = ntohl (msg->exp_subround);
 
   cpi = &session->info[index];
@@ -979,11 +1052,12 @@
        * complete the old one! */
       if (NULL != cpi->set_op)
       {
+        LOG_PP (GNUNET_ERROR_TYPE_INFO, cpi, "got new request from same peer, 
canceling old one\n");
         GNUNET_SET_operation_cancel (cpi->set_op);
         cpi->set_op = NULL;
       }
       set_op = GNUNET_SET_accept (request, GNUNET_SET_RESULT_ADDED,
-                                       set_result_cb, &session->info[index]);
+                                  set_result_cb, &session->info[index]);
       if (cmp == 0)
       {
         cpi->set_op = set_op;
@@ -992,10 +1066,12 @@
       }
       else
       {
-        /* if there's a exp subround running, mark it as finished, as the set 
op has been canceled! */
+        /* we still have wait until we have finished the current round,
+         * as the other peer's round is larger */
         cpi->delayed_set_op = set_op;
         cpi->delayed_round_info = round_info;
-        cpi->exp_subround_finished = GNUNET_YES;
+        /* The current setop is finished, as we canceled the current setop 
above. */
+        cpi->set_op_finished = GNUNET_YES;
         GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "P%d delaying set request from 
P%d\n", session->local_peer_idx, index);
       }
       break;
@@ -1242,7 +1318,10 @@
     return;
   if ((CONSENSUS_ROUND_BEGIN == session->current_round) ||
       (CONSENSUS_ROUND_FINISH == session->current_round))
+  {
+    GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "client disconnected, destroying 
session\n");
     destroy_session (session);
+  }
   else
     GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "client disconnected, but waiting for 
consensus to finish\n");
 }

Modified: gnunet/src/consensus/test_consensus.conf
===================================================================
--- gnunet/src/consensus/test_consensus.conf    2014-02-10 00:13:13 UTC (rev 
32268)
+++ gnunet/src/consensus/test_consensus.conf    2014-02-10 00:30:23 UTC (rev 
32269)
@@ -4,7 +4,7 @@
 HOSTNAME = localhost
 BINARY = gnunet-service-consensus
 #PREFIX = gdbserver :12345
-#PREFIX = valgrind --leak-check=full 
+#PREFIX = valgrind
 ACCEPT_FROM = 127.0.0.1;
 ACCEPT_FROM6 = ::1;
 UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-service-consensus.sock
@@ -23,6 +23,7 @@
 [set]
 OPTIONS = -L INFO
 #PREFIX = valgrind --leak-check=full
+#PREFIX = valgrind
 
 
 [testbed]

Modified: gnunet/src/secretsharing/gnunet-secretsharing-profiler.c
===================================================================
--- gnunet/src/secretsharing/gnunet-secretsharing-profiler.c    2014-02-10 
00:13:13 UTC (rev 32268)
+++ gnunet/src/secretsharing/gnunet-secretsharing-profiler.c    2014-02-10 
00:30:23 UTC (rev 32269)
@@ -298,7 +298,12 @@
   }
   else
   {
-    GNUNET_log (GNUNET_ERROR_TYPE_INFO, "secret ready for peer #%u\n", n);
+    ret = GNUNET_STRINGS_data_to_string (public_key, sizeof *public_key, 
pubkey_str, 1024);
+    GNUNET_assert (NULL != ret);
+    *ret = '\0';
+    GNUNET_log (GNUNET_ERROR_TYPE_INFO, "key generation successful for peer 
#%u, pubkey %s\n", n,
+                pubkey_str);
+
     /* we're the first to get the key -> store it */
     if (num_generated == 1)
     {
@@ -312,12 +317,6 @@
     }
   }
 
-  ret = GNUNET_STRINGS_data_to_string (public_key, sizeof *public_key, 
pubkey_str, 1024);
-  GNUNET_assert (NULL != ret);
-  *ret = '\0';
-  GNUNET_log (GNUNET_ERROR_TYPE_INFO, "key generation successful for peer #%u, 
pubkey %s\n", n,
-              pubkey_str);
-
   // FIXME: destroy testbed operation
 
   if (num_generated == num_peers)




reply via email to

[Prev in Thread] Current Thread [Next in Thread]